Home
Jobs

471 Vulnerability Management Jobs - Page 11

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 5.0 years

3 - 6 Lacs

Hyderabad

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Vulnerability Management. Experience: 3-5 Years.

Posted 3 weeks ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

About Netskope Since 2012, we have built the market-leading cloud security company and an award-winning culture powered by hundreds of employees spread across offices in Santa Clara, St. Louis, Bangalore, London, Paris, Melbourne, Taipei, and Tokyo. Our core values are openness, honesty, and transparency, and we purposely developed our open desk layouts and large meeting spaces to support and promote partnerships, collaboration, and teamwork. From catered lunches and office celebrations to employee recognition events and social professional groups such as the Awesome Women of Netskope (AWON), we strive to keep work fun, supportive and interactive. Visit us at Netskope Careers. Please follow us on LinkedIn and Twitter @Netskope . About the position Netskope is looking for an analyst on the Threat and Vulnerability Management team. This position will focus on the identification and proactive mitigation of Netskope s attack surface, threat landscape, security gaps , and cyber threats which could impact the business. In addition, this role will be responsible for performing the vulnerability management function such as finding, reporting, and supporting business units in their vulnerability remediation efforts. Roles & Responsibilities Continuous development and execution of the enterprise Threat and Vulnerability Management strategic plan to identify and reduce vulnerable attack surfaces Perform complex analysis to understand emerging threats, and continuously demonstrates awareness of current threat posture Reviews emerging and existing threat methodologies and exploit code / proof of concept code to develop mitigations, prioritize risks and navigating sources for identification of vulnerable assets. Execute on core team functions such as scanning, reporting, custom checks, asset tagging, as well as incorporating threat intelligence into vulnerability checks Automate security tasks using scripting languages such as python. Maintain and contribute to the threat models understanding emerging/existing threats and countermeasures to them. Partners with internal teams to lead, develop, test, and continuously validate detection signatures for various attacks Provide internal teams with hardening guidance and develop tooling for auditing Support teams by being a Remediation Champion giving them guidance on various strategies to remediate a vulnerability and supporting them in their testing and validation efforts. Provides expertise in incident response activities. Teach and understand CVSS, CVE, and additional vulnerability ratings and methodologies Qualifications/Requirements Experience 2 to 5 Yrs in Security Should possess relevant university degree and/or professional qualifications/certification (e.g. CEH, OSCP) Must have knowledge with tools Tenable, Qualys, NMAP, SCAPY, and other tools. Must have the ability to understand hardening guidelines for new technologies and applications being adopted by Netskope. Understanding of containerization and containerized applications, their security weaknesses and how to secure them Must have an understanding of patch automation, security orchestration, and management tooling for on premise, private cloud, and cloud infrastructure. Knowledge of OWASP Web and Mobile Top 10 vulnerabilities and identifying them. Knowledge of TCP/IP and other application and network level protocols. Knowledge of Cloud Applications like AWS, Azure and other SAAS Applications. Excellent written and verbal communication skills. Self-motivated, curious, knowledgeable pertaining to news and current events. Ability to be effective in a remote global work environment. #LI-RS1

Posted 3 weeks ago

Apply

2.0 - 5.0 years

1 - 4 Lacs

Hyderabad

Work from Office

Naukri logo

Client Server Tech is looking for System Security / Engineer to join our dynamic team and embark on a rewarding career journey. Develop and implement system security strategies and solutions. Monitor and analyze security incidents and threats. Conduct incident response and investigation. Collaborate with cross-functional teams on security projects. Ensure compliance with security standards and regulations. Provide training and support on security best practices.

Posted 3 weeks ago

Apply

1.0 - 4.0 years

1 - 4 Lacs

Surat

Work from Office

Naukri logo

Certbar Security is looking for Junior Security Analyst to join our dynamic team and embark on a rewarding career journey. Defining, planning, implementing, maintaining, and upgrading security measures, policies, and controls Assisting with the creation of updates and training programs to secure the network and train the employees Keeping the security systems up to date Monitoring security access and maintaining the relevant data Conducting vulnerability testing and risk analyses to assess security and performing internal and external security audits Analyzing security breaches to identify the cause and to update incidence responses and disaster recovery plans

Posted 3 weeks ago

Apply

1.0 - 4.0 years

2 - 5 Lacs

Surat

Work from Office

Naukri logo

Certbar Security is looking for Junior SOC Analyst to join our dynamic team and embark on a rewarding career journey. Monitor and analyze security events and incidents, identifying and investigating potential threats Maintain the security of our network and systems by implementing security controls and best practices Work closely with the rest of the security team to ensure that our systems and networks are secure and compliant with industry standards Maintain accurate documentation and reports on security events and incidents Communicate effectively with team members and other stakeholders to ensure that security issues are addressed in a timely and effective manner Stay up to date with the latest security technologies and threats

Posted 3 weeks ago

Apply

2.0 - 5.0 years

15 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

Not Applicable Specialism Risk Management Level Associate & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisations security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purposeled and valuesdriven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations & Summary A career within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. We play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats Experience in conducting IT risk assessments. Sound understanding of ISO 27001, NIST, PCI, Data Privacy, and Cloud Security. Knowledge on application infrastructure architecture. Knowledge on SaaS application architecture. Knowledge on database and middleware communication. Knowledge on API security. Good communication skills. Good team player. Good presentation skills and senior stakeholder management. Certifications CISA, CISSP, CCNP, CCSP, CISM, CRISC etc. Mandatory Skill Sets IT Risk , ISO 27001, NIST, PCI, Data Privacy, and Cloud Security. Preferred Skill Sets Stakeholder Management , Team Management Years of Experience Required 3 + Years Education Qualification BE, B.Tech , M.Tech , MCA, MBA graduates . Education Degrees/Field of Study required Bachelor of Technology, Master of Business Administration, Master of Engineering Degrees/Field of Study preferred Required Skills Information Technology (IT) Risk Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Cloud Security, Communication, Conducting Research, Cyber Defense, Cyber Threat Intelligence, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Malware Analysis, Malware Detection Tools, Malware Intelligence Gathering, Malware Research, Malware Reverse Engineering, Malware Sandboxing {+ 11 more} No

Posted 3 weeks ago

Apply

2.0 - 6.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Not Applicable Specialism Risk Management Level Associate & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisations security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purposeled and valuesdriven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations & Summary A career within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations , partners and customers. We play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats. Strong communication , presentation skills with stakeholder management Good Information Security background both technical and functional. Technical background managing network security, endpoint security, threat intelligence, and risk and incident management. Experience with compliance frameworks and standards, such as PCI DSS, NIST, ISO27001, etc. Prior IT risk management experience a must Have experience with ISO 27001 implementation engagements. Experience with NIST CSF assessments. Exposure to data privacy assessments Plan, evaluate, and direct complex security programs covering multiple and inparallel projects. Understand key Cyber Security considerations including key Cyber Security Risks and projects and innovations Track projects/remediation activities Work independently and prioritize multiple tasks and adapt to needed changes Handle and track remediation of open findings/action items with relevant teams Good to have requirements Prior Big4 experience a plus Certifications such as CISSP, CISM,CISA , ISO 27001 , a plu s Mandatory Skill Sets Experience on network security, endpoint security, threat intelligence, and risk and incident management. Compliance frameworks and standards, such as PCI DSS, NIST, ISO27001, etc. Prior IT risk management ISO 27001 implementation NIST CSF assessment D ata privacy assessments Preferred Skill Sets Prior Big4 experience a plus Certifications such as CISSP, CISM,CISA , ISO 27001 , a plu s Years of Experience Required 3 + Years Education Qualification Bachelor s degree in C omputer S cience , Information Technology, Cybersecurity, or a related field Advanced degrees and relevant professional certifications are highly desirable. Education Degrees/Field of Study required Bachelor of Technology Degrees/Field of Study preferred Required Skills Information Technology General Controls (ITGC) Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Cloud Security, Communication, Conducting Research, Cyber Defense, Cyber Threat Intelligence, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Malware Analysis, Malware Detection Tools, Malware Intelligence Gathering, Malware Research, Malware Reverse Engineering, Malware Sandboxing {+ 11 more} No

Posted 3 weeks ago

Apply

4.0 - 9.0 years

15 - 19 Lacs

Bengaluru

Work from Office

Naukri logo

locationsBangalore, Indiaposted onPosted 10 Days Ago job requisition id30684 FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity "This is an opportunity to define, build, and shape the future of FICOs Cybersecurity and Risk Posture. As part of the Threat & Vulnerability Management team, you will collaborate across the business, IT, and client environments to secure our cloud and data center infrastructure. Your contributions will be key to strengthening FICO's defense mechanisms and enhancing our compliance posture. We're looking for a cybersecurity expert passionate about continuous improvement, cloud security, and vulnerability risk reduction. If you're someone who thrives in a fast-paced environment and wants to work on high-impact global security initiatives, this role is for you" - VP, Software Engineering. What Youll Contribute Detect, identify, and analyze vulnerabilities across FICO environment. Assess the risk of vulnerabilities detected to determine true impact. Support stakeholders as a SME to understand technical details of vulnerabilities and steps to carry out remediation. Coordinate with stakeholders to track issues remediation until closure. Act as a SME for new projects in terms of vulnerability management lifecycle. Manage, maintain, and tune tools used to support the VM process. Update yourself with the latest security and technology developments. What Were Seeking Experience in a similar role such as vulnerability management specialist. Experience with Qualys or other security vulnerability detection technology required. Demonstrates subject-matter expert level understanding in multiple IT, Security and Software disciplines. Ability to understand the cause and effect of application vulnerabilities with Operating System Vulnerabilities. Must be able to multi-task and keep track of large amounts of information across disparate systems. Ability to keep making progress and define future strategy/policy with regards to Enterprise. Adherent to continuous monitoring and continuous improvement thought process. Demonstrated technical IT skills, ability to understand and manage different OS flavors, network technologies and topologies. Demonstrated technical security expertise in a variety of cloud platforms (AWS is preferred). Comfortable interfacing with other internal or external organizations regarding problems that must be addressed to enhance security posture. Ability to effectively translate and present solutions in business or management terms. Ability to work effectively in a team environment. Knowledge of Python scripting or other languages is nice to have. Moderate documentation and analytical skills; documenting processes, policies, and standards. Moderate ability to provide end-to-end support to enterprise counterparts, identifying root- cause of complex enterprise initiatives. Moderate trouble shooting skills across complex enterprise applications, server, and endpoint environments. Moderate ability to learn onboard and adapt to new technologies. Basic privileged access management/right management experience, designing solutions based on least privilege. Basic knowledge of malware operation, indicators or threat. Moderate knowledge of current threat landscape Entry Cybersecurity certifications, such as CompTIA Security +, GIAC Security Fundamentals, GIAC Security Essentials, ISC2 Associate, ISACA Cybersecurity Fundamentals are nice to have. Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at

Posted 3 weeks ago

Apply

7.0 - 10.0 years

15 - 30 Lacs

Noida, Ghaziabad, Delhi / NCR

Work from Office

Naukri logo

Seeking a Security Engineer to lead GRC initiatives, manage compliance, conduct risk assessments, and support audits. Must have strong knowledge of security frameworks, controls, and regulatory standards.

Posted 3 weeks ago

Apply

5.0 - 10.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Security Data Privacy Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will be involved in designing, building, and configuring applications to meet business process and application requirements. Your typical day will revolve around creating innovative solutions to address various business needs and ensuring seamless application functionality. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Lead the team in implementing cutting-edge security and data privacy measures- Conduct regular security audits and assessments to identify vulnerabilities- Develop and implement data protection strategies to safeguard sensitive information Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Data Privacy- Strong understanding of data encryption techniques- Experience in implementing access control mechanisms- Knowledge of regulatory compliance standards such as GDPR and HIPAA- Familiarity with security assessment tools and methodologies Additional Information:- The candidate should have a minimum of 5 years of experience in Security Data Privacy- This position is based at our Bengaluru office- A 15 years full time education is required Qualification 15 years full time education

Posted 3 weeks ago

Apply

16.0 - 21.0 years

9 - 13 Lacs

Navi Mumbai

Work from Office

Naukri logo

Project Role : Software Development Lead Project Role Description : Develop and configure software systems either end-to-end or for a specific stage of product lifecycle. Apply knowledge of technologies, applications, methodologies, processes and tools to support a client, project or entity. Must have skills : SAP Governance Risk and Compliance (SAP GRC) Good to have skills : SAP Infrastructure Security, SAP SecurityMinimum 12 year(s) of experience is required Educational Qualification : 16 years full time education Summary :As a Software Development Lead, you will be responsible for developing and configuring software systems, applying knowledge of technologies, methodologies, and tools to support projects or clients in Mumbai. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Lead the team in implementing best practices.- Provide technical guidance and mentorship to team members.- Ensure project milestones are met within the specified timeline. Professional & Technical Skills: - Must To Have Skills: Proficiency in SAP Governance Risk and Compliance (SAP GRC).- Strong understanding of SAP Security.- Experience with SAP Infrastructure Security.- Knowledge of software development lifecycle.- Expertise in project management.- Excellent communication and leadership skills. Additional Information:- The candidate should have a minimum of 12 years of experience in SAP Governance Risk and Compliance (SAP GRC).- This position is based at our Mumbai office.- A 16 years full-time education is required. Qualification 16 years full time education

Posted 3 weeks ago

Apply

5.0 - 10.0 years

6 - 12 Lacs

Mumbai

Work from Office

Naukri logo

About the Role We are seeking candidates having experience in Network security. Infrastructure security Engineer is responsible for safeguarding the Banking Client's network infrastructure by implementing and managing robust security measures. The Engineer will work on-site at Client's Datacenter with coverage of 16X6 Support. Key Responsibilities Escalation support for L1 team, plus regular management, and administration tasks. Responsibility for diagnosis and problem management. Provide inputs to Level 3 team for consulting, IT Infrastructure planning and change management. Configure, Manage and Modify the IT Infrastructure Incident Management and suggesting changes as and when required Addressing network issues on Routing, Switching and Configurations. IP Address Management –Configure, Manage and Modify Managing configuration changes based on user request Incident Management and suggesting changes as and when required Basic Qualifications BE/B. Tech (CSE, ECE/IT) or MCA /MSc (CS) with Science background. Minimum 5 years of experience in managing network operations services with a minimum CCNP or equivalent certifications Network security, VPN, SWG will be preferred. Preferred Qualifications CCNP- Security Certification ITILv4 Certification

Posted 3 weeks ago

Apply

1.0 - 9.0 years

3 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

Career Category Information Systems Job Description Join Amgen s Mission of Serving Patients At Amgen, if you feel like you re part of something bigger, it s because you are. Our shared mission to serve patients living with serious illnesses drives all that we do. Since 1980, we ve helped pioneer the world of biotech in our fight against the world s toughest diseases. With our focus on four therapeutic areas -Oncology, Inflammation, General Medicine, and Rare Disease- we reach millions of patients each year. As a member of the Amgen team, you ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. Information Security Engineer - Vulnerability Management Analyst What you will do Let s do this. Let s change the world. In this vital role is focused on identifying, assessing, prioritizing, and tracking the remediation of vulnerabilities across the organization s technology stack. The Vulnerability Management Analyst plays a key role in the security operations team by ensuring known vulnerabilities are managed through their lifecycle using structured processes and tools. The individual will analyze vulnerability scan data, correlate threat intelligence (e. g. , KEV, EPSS), and work closely with infrastructure, application, and business teams to drive risk-based remediation. Roles & Responsibilities: Analyze vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. Partner with IT and DevOps teams to track remediation progress and provide technical guidance on mitigation strategies. Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. Support vulnerability assessment activities in cloud environments (AWS, Azure, etc. ). Maintain documentation related to the vulnerability management lifecycle. Assist in policy and process development related to vulnerability and patch management. Participate in audits and compliance efforts (e. g. , SOX, ISO, NIST, PCI). What we expect of you We are all different, yet we all use our unique contributions to serve patients. Master s degree and 1 to 3 years of experience in Cybersecurity, vulnerability management or information security operations OR Bachelor s degree and 3 to 5 years of experience in Cybersecurity, vulnerability management or information security operations OR Diploma and 7 to 9 years of experience in Cybersecurity, vulnerability management or information security operations Must-Have Skills: Familiarity with vulnerability management tools (e. g. , Tenable, Qualys, Rapid7). Understanding of CVSS scoring, vulnerability lifecycle, and remediation workflows. Basic knowledge of threat intelligence and how it applies to vulnerability prioritization. Working knowledge of network, operating system, and application-level security. Ability to analyze scan data and correlate it with business context and threat intelligence. Preferred Qualifications: Good-to-Have Skills: Experience with KEV, EPSS, and other threat-based scoring systems. Familiarity with patch management processes and tools. Exposure to cloud security and related scanning tools (e. g. , Prisma Cloud, AWS Inspector). CompTIA Security+ GIAC GSEC / GCIH Qualys Vulnerability Management Specialist (QVMS) Tenable Certified Nessus Auditor (TCNA) Soft Skills: Analytical Thinking - Ability to interpret complex data sets and assess risk effectively Attention to Detail - Precision in identifying and tracking vulnerabilities and remediation status Communication Skills - Ability to communicate technical findings to both technical and non-technical audiences Collaboration & Teamwork - Able to work across IT, DevOps, and security teams to drive resolution Curiosity & Continuous Learning - Willingness to know the latest with evolving threats and technologies Problem-Solving Approach - Capability to identify solutions to security weaknesses in diverse environments What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now and make a lasting impact with the Amgen team. careers. amgen. com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. .

Posted 3 weeks ago

Apply

1.0 - 9.0 years

5 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

Career Category Information Systems Job Description Join Amgen s Mission of Serving Patients At Amgen, if you feel like you re part of something bigger, it s because you are. Our shared mission to serve patients living with serious illnesses drives all that we do. Since 1980, we ve helped pioneer the world of biotech in our fight against the world s toughest diseases. With our focus on four therapeutic areas -Oncology, Inflammation, General Medicine, and Rare Disease- we reach millions of patients each year. As a member of the Amgen team, you ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. Information Security Engineer - Vulnerability Management Analyst What you will do Let s do this. Let s change the world. In this vital role is focused on identifying, assessing, prioritizing, and tracking the remediation of vulnerabilities across the organization s technology stack. The Vulnerability Management Analyst plays a key role in the security operations team by ensuring known vulnerabilities are managed through their lifecycle using structured processes and tools. The individual will analyze vulnerability scan data, correlate threat intelligence (e. g. , KEV, EPSS), and work closely with infrastructure, application, and business teams to drive risk-based remediation. Roles & Responsibilities: Analyze vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. Prioritize vulnerabilities using multiple criteria, including CVSS, KEV (Known Exploited Vulnerabilities), EPSS (Exploit Prediction Scoring System), asset criticality, and business context. Partner with IT and DevOps teams to track remediation progress and provide technical guidance on mitigation strategies. Monitor threat intelligence feeds to correlate vulnerabilities with current exploit activity. Create and maintain vulnerability metrics, dashboards, and reports for leadership and compliance teams. Support vulnerability assessment activities in cloud environments (AWS, Azure, etc. ). Maintain documentation related to the vulnerability management lifecycle. Assist in policy and process development related to vulnerability and patch management. Participate in audits and compliance efforts (e. g. , SOX, ISO, NIST, PCI). What we expect of you We are all different, yet we all use our unique contributions to serve patients. Master s degree and 1 to 3 years of experience in Cybersecurity, vulnerability management or information security operations OR Bachelor s degree and 3 to 5 years of experience in Cybersecurity, vulnerability management or information security operations OR Diploma and 7 to 9 years of experience in Cybersecurity, vulnerability management or information security operations Must-Have Skills: Familiarity with vulnerability management tools (e. g. , Tenable, Qualys, Rapid7). Understanding of CVSS scoring, vulnerability lifecycle, and remediation workflows. Basic knowledge of threat intelligence and how it applies to vulnerability prioritization. Working knowledge of network, operating system, and application-level security. Ability to analyze scan data and correlate it with business context and threat intelligence. Preferred Qualifications: Good-to-Have Skills: Experience with KEV, EPSS, and other threat-based scoring systems. Familiarity with patch management processes and tools. Exposure to cloud security and related scanning tools (e. g. , Prisma Cloud, AWS Inspector). CompTIA Security+ GIAC GSEC / GCIH Qualys Vulnerability Management Specialist (QVMS) Tenable Certified Nessus Auditor (TCNA) Soft Skills: Analytical Thinking - Ability to interpret complex data sets and assess risk effectively Attention to Detail - Precision in identifying and tracking vulnerabilities and remediation status Communication Skills - Ability to communicate technical findings to both technical and non-technical audiences Collaboration & Teamwork - Able to work across IT, DevOps, and security teams to drive resolution Curiosity & Continuous Learning - Willingness to know the latest with evolving threats and technologies Problem-Solving Approach - Capability to identify solutions to security weaknesses in diverse environments What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now and make a lasting impact with the Amgen team. careers. amgen. com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. .

Posted 3 weeks ago

Apply

3.0 - 8.0 years

6 - 10 Lacs

Kolkata

Work from Office

Naukri logo

Job Title : Business Continuity Specialist Qualification : Any Finance Graduate /LLB Experience : 3-5 Years Must Have Skills : > Knowledge of global regulations and industry standards, including ISO 22301, ISO/IEC 27001, and ISO 31000 ERM Standard and/or 2017 COSO ERM Framework > Experience on Business Continuity Management. Good to Have Skills : Strong understanding of risk management frameworks, internal controls, and compliance auditing. Experience with risk management software, data analytics tools, and reporting systems. Ability to identify patterns and evaluate complex regulatory risks and propose practical solutions. Excellent communication skills with the ability to present complex information to non-technical stakeholders. Strong attention to detail and a proactive approach to problem-solving. Quick adjustment to new tools, regulations, and client requirements in the fast-paced BPO environment. Ability to work effectively both independently and as part of a global team. Experience working with cross-functional teams in a global environment. Strong analytical and project management skills with the ability to manage multiple priorities simultaneously. Proven organizational planning and management skills; excellent communication skills; and proven emergency and incident management skills. Proficiency on windows applications Roles and Responsibilities : Develop and Maintain Business Continuity Plans: l Design, implement, and regularly maintain/update comprehensive and sustainable business continuity programs through regular review, updating, and development of BCM policies, guidelines, procedures, and plans to ensure critical business functions can continue during and after disruptions. Collaborate with departments to identify critical functions and recovery requirements. Business Continuity Plans per campaign/support group Emergency Preparedness and Response Plan Incident Management Plan Crisis Management Plan Disaster Recovery Plans, etc. Conduct Business Impact Analysis: l Perform regular analyses to assess the potential impact of various disruptions on business operations. l Prioritize essential functions and develop strategies to minimize downtime and ensure recovery. l Create analytics and reports based on these analyses, and provide strategic recommendations to the BCM Lead to enhance organizational resilience. Lead Continuity Testing and Exercises: l Organize and execute testing and simulation exercises of business continuity plans. l Evaluate the effectiveness of plans and make improvements based on test results and feedback. Manage Continuity Resources : l Oversee the acquisition and maintenance of necessary resources and tools for business continuity. l Drive internal awareness and understanding through various training, and engagements to team members and leaders. l Keep abreast of industry best practices and trends, sharing the same to the organization. l Ensure Compliance : l Maintain business continuity plans in accordance with contractual obligations, relevant regulations, industry standards, and organizational policies, with a strong emphasis on adherence to ISO 22301:2019 to ensure we follow global standards. Regularly review and update plans to reflect changes in regulations or organizational needs. In line with this, management reviews and internal audits are included for a complete end-to-end compliance to the standard. l Act as a subject matter expert for BCM related activities. Incident Management and Response: l Develop and implement incident management strategies, including incident identification, response coordination, and stakeholder communication. l Regularly lead training sessions to enhance staff readiness, document incidents, conduct post-incident evaluations, ensure regulatory compliance, prepare reports for senior management, and continuously improve processes based on best practices and emerging threats. l During incidents, provides guidance to identify, manage, and implement appropriate Business Continuity Plans. Identify and Assess Risks: l Provide inputs to the corresponding Risk Registers. l Conduct risk assessments to identify and evaluate potential threats and vulnerabilities. l Analyze the likelihood and impact of identified risks to business operations. Develop Risk Management Strategies: l Assist in formulating and implementing risk management strategies to mitigate identified risks. l Develop and document risk response plans and procedures. Monitor and Report Risks: l Continuously monitor the risk environment and track emerging risks. l Prepare and present risk assessment reports and recommendations to senior management and relevant stakeholders. Compliance Oversight: l Stay up to date with relevant laws, regulations, contractual obligations and industry standards to ensure compliance across the organization. l Develop and implement compliance programs and processes to ensure adherence to legal and regulatory requirements. l Conduct periodic compliance audits and reviews to identify potential compliance issues and recommend corrective actions Promote Risk Awareness: l Foster a culture of risk awareness and management across the organization. l Provide training and guidance to employees on effective risk management practices and procedures. Coordinate with External Partners: l Collaborate with external vendors, consultants, and regulatory bodies to address external risk factors andensure compliance with industry standards and regulations Location : Jaipur CTC Range : 10 lpa (lakh per annum) Notice period : Immediate - 15days Shift Timings : Rotational Shift Mode of Interview : Virtual Mode of Work : WFH (work from home) Mode of Hire : Permanent Note : NA Thanks & Regards, Thanks & Regards, HR Sneha Staffing Analyst Black and White Business Solutions Pvt Ltd Bangalore, Karnataka, INDIA. Direct Number: 8067432406| Whatsapp :8951047887|sneha.v@blackwhite.in | www.blackwhite.in ************************PLEASE REFER YOUR FRIENDS***********************

Posted 3 weeks ago

Apply

10.0 - 14.0 years

35 - 50 Lacs

Hyderabad

Work from Office

Naukri logo

We are keenly looking for a resource with 10+ years of experience who had both technical and managerial experience to execute a lead position from offshore. Primary Skill: Azure DevOps, Jfrog Artifactory, SonarQ, DevSecOps(SAST & DAST), Azure native App Security Secondary Skill: Containerization and Orchestration tools. Shift details: Day shift overlapping with EST (2PM-10:30PM) Technical Leadership & team management at Offshore: • Technical Leadership: Provide guidance to ensure best practices and quality standard are maintained in deliverables. Understand Selective standards and help ensure deliverables meets and adhere to the standards. If standards are missing collaborate with the core team to build standards as needed/required • Team Guidance: Lead and support DevOps engineers to achieve project goals. • Team Management: Lead and coordinate offshore DevOps teams. • Sprint Planning: Assist with offshore sprint planning, estimates, and timelines for the work aligned. • Work Execution: Run stand-ups and manage work execution. • Resource Optimization: Optimize team member capacity utilization. • Risk Management: Identify and mitigate risks aligned to the work • Documentation: Maintain detailed documentation of processes and projects Mature Offshore-Driven Operations and Operational capabilities : • SOP Development: Create standard operating procedures for operational tasks. • Communication: Establish clear channels with DevOps service consumers and stakeholders. • Continuous Improvement: Encourage innovation and automation. • SRE for key DevOps tooling: Build Site Reliability Engineering around DevOps platforms and tools. Build health checks for the key platforms. • Keeping platforms/tooling evergreen. Report/track on tech currency • Improve & automate operational onboarding - drive platform Self service capabilities for our end customer Collaboration and Coordination: • Stakeholder Updates: Provide regular updates to stakeholders. • Team Collaboration: Work with development, QA, and operations teams. • Performance Tracking: Develop and monitor key performance indicators (KPIs).

Posted 3 weeks ago

Apply

3.0 - 8.0 years

6 - 11 Lacs

Kolkata

Work from Office

Naukri logo

Job Title : Business Continuity Specialist Qualification : Any Finance Graduate /LLB Experience : 3-5 Years Must Have Skills : > Knowledge of global regulations and industry standards, including ISO 22301, ISO/IEC 27001, and ISO 31000 ERM Standard and/or 2017 COSO ERM Framework > Experience on Business Continuity Management. Good to Have Skills : Strong understanding of risk management frameworks, internal controls, and compliance auditing. Experience with risk management software, data analytics tools, and reporting systems. Ability to identify patterns and evaluate complex regulatory risks and propose practical solutions. Excellent communication skills with the ability to present complex information to non-technical stakeholders. Strong attention to detail and a proactive approach to problem-solving. Quick adjustment to new tools, regulations, and client requirements in the fast-paced BPO environment. Ability to work effectively both independently and as part of a global team. Experience working with cross-functional teams in a global environment. Strong analytical and project management skills with the ability to manage multiple priorities simultaneously. Proven organizational planning and management skills; excellent communication skills; and proven emergency and incident management skills. Proficiency on windows applications Roles and Responsibilities : Develop and Maintain Business Continuity Plans: l Design, implement, and regularly maintain/update comprehensive and sustainable business continuity programs through regular review, updating, and development of BCM policies, guidelines, procedures, and plans to ensure critical business functions can continue during and after disruptions. Collaborate with departments to identify critical functions and recovery requirements. Business Continuity Plans per campaign/support group Emergency Preparedness and Response Plan Incident Management Plan Crisis Management Plan Disaster Recovery Plans, etc. Conduct Business Impact Analysis: l Perform regular analyses to assess the potential impact of various disruptions on business operations. l Prioritize essential functions and develop strategies to minimize downtime and ensure recovery. l Create analytics and reports based on these analyses, and provide strategic recommendations to the BCM Lead to enhance organizational resilience. Lead Continuity Testing and Exercises: l Organize and execute testing and simulation exercises of business continuity plans. l Evaluate the effectiveness of plans and make improvements based on test results and feedback. Manage Continuity Resources : l Oversee the acquisition and maintenance of necessary resources and tools for business continuity. l Drive internal awareness and understanding through various training, and engagements to team members and leaders. l Keep abreast of industry best practices and trends, sharing the same to the organization. l Ensure Compliance : l Maintain business continuity plans in accordance with contractual obligations, relevant regulations, industry standards, and organizational policies, with a strong emphasis on adherence to ISO 22301:2019 to ensure we follow global standards. Regularly review and update plans to reflect changes in regulations or organizational needs. In line with this, management reviews and internal audits are included for a complete end-to-end compliance to the standard. l Act as a subject matter expert for BCM related activities. Incident Management and Response: l Develop and implement incident management strategies, including incident identification, response coordination, and stakeholder communication. l Regularly lead training sessions to enhance staff readiness, document incidents, conduct post-incident evaluations, ensure regulatory compliance, prepare reports for senior management, and continuously improve processes based on best practices and emerging threats. l During incidents, provides guidance to identify, manage, and implement appropriate Business Continuity Plans. Identify and Assess Risks: l Provide inputs to the corresponding Risk Registers. l Conduct risk assessments to identify and evaluate potential threats and vulnerabilities. l Analyze the likelihood and impact of identified risks to business operations. Develop Risk Management Strategies: l Assist in formulating and implementing risk management strategies to mitigate identified risks. l Develop and document risk response plans and procedures. Monitor and Report Risks: l Continuously monitor the risk environment and track emerging risks. l Prepare and present risk assessment reports and recommendations to senior management and relevant stakeholders. Compliance Oversight: l Stay up to date with relevant laws, regulations, contractual obligations and industry standards to ensure compliance across the organization. l Develop and implement compliance programs and processes to ensure adherence to legal and regulatory requirements. l Conduct periodic compliance audits and reviews to identify potential compliance issues and recommend corrective actions Promote Risk Awareness: l Foster a culture of risk awareness and management across the organization. l Provide training and guidance to employees on effective risk management practices and procedures. Coordinate with External Partners: l Collaborate with external vendors, consultants, and regulatory bodies to address external risk factors andensure compliance with industry standards and regulations Location : Jaipur CTC Range : 10 lpa (lakh per annum) Notice period : Immediate - 15days Shift Timings : Rotational Shift Mode of Interview : Virtual Mode of Work : WFH (work from home) Mode of Hire : Permanent Note : NA Thanks & Regards, Thanks & Regards, HR Janhavi Staffing Analyst Black and White Business Solutions Pvt Ltd Bangalore, Karnataka, INDIA. Direct Number: 8067432471| janhavi@blackwhite.in | www.blackwhite.in ************************PLEASE REFER YOUR FRIENDS***********************

Posted 3 weeks ago

Apply

5.0 - 10.0 years

10 - 18 Lacs

Kolkata

Work from Office

Naukri logo

We are looking for a highly experienced Senior Cybersecurity Engineer with advanced skills in Splunk, CrowdStrike, vulnerability management, and identity provider (IDP) systems. This role will be instrumental in building robust detection, response, and identity-integrated security capabilities to defend against evolving threats. The ideal candidate will have a hands-on, security engineering mindset and a proven track record working across endpoint protection, SIEM, and identity systems. Key Responsibilities: Deploy, manage, and optimize Splunk Enterprise Security (ES) for real-time detection, alerting, and correlation of security events. Design and build custom SPL queries, dashboards, and threat detection logic, integrating data from CrowdStrike, IDPs, and vulnerability scanners. Lead the vulnerability management program, including scanning (Qualys, Tenable, Rapid7), analysis, risk prioritization, and driving remediation. Maintain and configure CrowdStrike Falcon, including prevention policies, detection tuning, response playbooks, and integration with SIEM and SOAR platforms. Leverage CrowdStrike telemetry for threat hunting, endpoint investigations, and threat actor tracking. Integrate and manage IDP platforms (e.g., Okta, Azure AD, Entra ID) to secure identity access, enforce MFA/SSO, and detect anomalous user behavior. Correlate identity, endpoint, and vulnerability data to drive risk-based alerting and incident response. Collaborate with incident response, IAM, infrastructure, and compliance teams to maintain a resilient and auditable security posture. Required Qualifications: Bachelors degree in Computer Science, Cybersecurity, or related field. 5+ years of experience in cybersecurity roles with significant hands-on expertise in: Splunk (SPL, ES, dashboards, alerting) CrowdStrike Falcon (EDR management, threat hunting, integration) Vulnerability Management (Qualys, Tenable, or Rapid7) IDP platforms (Okta, Azure AD, Entra ID, etc.) Experience with scripting (Python, Bash, PowerShell) and API integrations. Familiarity with MITRE ATT&CK, threat modeling, CVSS, and Zero Trust principles. Preferred Certifications: Splunk Certified Architect or Admin CrowdStrike Certified Falcon Administrator (CCFA) or higher Okta Certified Professional or Azure Security Engineer Associate CISSP, OSCP, GIAC (GCIH, GMON, GCIA)

Posted 3 weeks ago

Apply

7.0 - 9.0 years

7 - 11 Lacs

Thiruvananthapuram

Work from Office

Naukri logo

Job Title: Specialist I - Information Security | Vulnerability Management - Subject Matter Expert (SME) Location:, Hyderabad , Chennai , Bangalore , Trivandrum , Cochin Experience: 7-9 years Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. Job Summary: We are seeking a highly experienced and knowledgeable Subject Matter Expert (SME) to join our Vulnerability Management team. The ideal candidate will possess deep expertise in cybersecurity, particularly in vulnerability management processes, tools, and best practices. This role demands strong analytical skills, excellent communication, and a proactive approach to security risk mitigation. Key Responsibilities: Lead and manage the vulnerability management program end-to-end. Conduct vulnerability assessments and penetration testing. Use tools like Qualys VMDR, MS Defender, and CrowdStrike to detect, analyze, and report vulnerabilities. Create dashboards and detailed reports with actionable recommendations. Prioritize vulnerabilities based on business risk and exploitability. Collaborate with technical teams for remediation planning and execution. Stay current with emerging threats, trends, and technologies. Deliver training on vulnerability management processes and tools. Support incident response efforts with expertise in vulnerability exploitation and mitigation. Ensure compliance with security frameworks and regulatory standards.

Posted 3 weeks ago

Apply

3.0 - 7.0 years

5 - 9 Lacs

Chennai

Work from Office

Naukri logo

Task Description: Vulnerability Mgmt Support & maintain the vulnerability detection & mitigation best practice Apply threat & VM program to information security practices & develop its maturity Participate in incident response triage & proactive analysis in information security related vulnerabilities detection & mitigation in the network, systems and/or application; Analyse vulnerability feeds & support the CDC operations with IOC/IOA based on vendor advisories , security alerts & threat trending; Provide analysis & apply CVSS scoring mechanism, that associated to all related vectors/strings of vulnerabilities; Detect, analyze, & acknowledged CDC operation & EDR team for latest threats/detection signature & creation of use cases that able to monitor or drop related vulnerability exploitations; Provide regular updates to the stakeholders on security assessment reports with detailed security issues & recommend workarounds; Regular tracking & maintain the vulnerability process cycle to ensure timely closure of all vulnerability findings ; Actively investigate the latest in security vulnerabilities, vendor advisories, security incidents, & penetration techniques & notify stakeholders when appropriate; Provide support & participate, in ongoing & future projects of VM . Provide security assessment & consultation o

Posted 3 weeks ago

Apply

3.0 - 8.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Application Developer Project Role Description : Design, build and configure applications to meet business process and application requirements. Must have skills : Microsoft Azure Sentinel Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Developer, you will be responsible for designing, building, and configuring applications to meet business process and application requirements. You will play a crucial role in developing innovative solutions to enhance business operations and efficiency. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Develop and implement software solutions to meet business requirements.- Collaborate with team members to design and optimize applications.- Troubleshoot and resolve technical issues in application development.- Stay updated with the latest technologies and trends in application development.- Provide technical guidance and support to junior team members. Professional & Technical Skills: - Must To Have Skills: Proficiency in Microsoft Azure Sentinel.- Strong understanding of cloud computing principles.- Experience with Azure services like Azure Functions, Azure Logic Apps.- Knowledge of DevOps practices and tools.- Hands-on experience in developing and deploying applications on Azure.- Good To Have Skills: Experience with Azure Security Center. Additional Information:- The candidate should have a minimum of 3 years of experience in Microsoft Azure Sentinel.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

15.0 - 20.0 years

12 - 16 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Integrated Security Risk Management Good to have skills : Security GovernanceMinimum 18 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will lead the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Roles & Responsibilities:- Expected to be a SME with deep knowledge and experience.- Should have influencing and Advisory skills.- Engage with multiple teams and responsible for team decisions.- Expected to provide solutions to problems that apply across multiple teams, and provide solutions to business area problems.- Lead the implementation and delivery of Security Services projects.- Utilize global delivery capability including methods, tools, training, and assets.- Provide expert advice and guidance on security governance.- Collaborate with various teams to ensure effective security solutions. Professional & Technical Skills: - Must To Have Skills: Proficiency in Integrated Security Risk Management.- Good To Have Skills: Experience with Security Governance.- Strong understanding of security risk management principles.- Knowledge of security governance frameworks and best practices.- Experience in leading security service delivery projects.- Excellent communication and leadership skills. Additional Information:- The candidate should have a minimum of 18 years of experience in Integrated Security Risk Management.- This position is based at our Gurugram office.- A 15 years full-time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

13.0 - 18.0 years

17 - 22 Lacs

Bengaluru

Work from Office

Naukri logo

Skill required: Employee Services - Employee and Labor Relations Designation: Delivery Lead Manager Qualifications: Any Graduation Years of Experience: 13 to 18 years About Accenture Accenture is a global professional services company with leading capabilities in digital, cloud and security.Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Technology and Operations services, and Accenture Song all powered by the worlds largest network of Advanced Technology and Intelligent Operations centers. Our 699,000 people deliver on the promise of technology and human ingenuity every day, serving clients in more than 120 countries. We embrace the power of change to create value and shared success for our clients, people, shareholders, partners and communities.Visit us at www.accenture.com What would you do Improve workforce performance and productivity, boosts business agility, increases revenue and reduces costsEmployee Services - More into query/case managementManage the labor laws. This encompasses interchanges between an employer and an employee and may include discussions on salary, benefit packages and employee rights. What are we looking for Is accountable for the results of the Service Line activities to both Accenture and Clients.Accountable for ongoing management of effective client service relationship within the service line. Develops new approaches and processes.Interfaces with other team leads, management and client staff and ensures good working relationships.Ensures the service line operations are efficient and effective and that SLA s are met.Ensure the first-class delivery of service to clients.Stakeholder ManagementChange ManagementTalent ManagementDemand ManagementLeadership DevelopmentSuccession PlanningJourney ManagementDemonstrates excellent client care skills.Expert knowledge and vision for the assigned service line. Produces solutions to complex business problems.Develops new concepts and opportunities within their Service Line.Contributes to policy and direction setting.Complies with all Client and Accenture Data Security and Quality requirements. Roles and Responsibilities: In this role you are required to identify and assess complex problems for area of responsibility The person would create solutions in situations in which analysis requires an in-depth evaluation of variable factors Requires adherence to strategic direction set by senior management when establishing near-term goals Interaction of the individual is with senior management at a client and/or within Accenture, involving matters that may require acceptance of an alternate approach Some latitude in decision-making in involved you will act independently to determine methods and procedures on new assignments Decisions individual at this role makes have a major day to day impact on area of responsibility The person manages large - medium sized teams and/or work efforts (if in an individual contributor role) at a client or within Accenture Please note that this role may require you to work in rotational shifts Qualification Any Graduation

Posted 3 weeks ago

Apply

5.0 - 10.0 years

13 - 17 Lacs

Gurugram

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Operations Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitate the transition to cloud security-managed operations, ensuring that security measures are effectively integrated into the cloud environment and aligned with organizational objectives. Roles & Responsibilities:-Administer a globally distributed and heterogeneous SIEM environment, preferably Securonix/Splunk-Knowledge on Automation app deployment to multiple sites, Monitoring the central infrastructure-Design and customize complex search queries, develop dashboards, data models, reports and optimize their performance-Administration of core SIEM Components (Deployment Server, Indexer)-Understanding of threat models and threat intelligence-Improve detection capabilities by building and enhancing alert rules Professional & Technical Skills: - Exp working in SOC/SIEM-Incident handling, use case management development , risk assessment, playbook recommendation, fine-tunings-SIEM/SOC operations experience for very large enterprises-Knowledge on MITRE/CKC framework-Security Analytical skills and analysis-Should have good customer handling skills-SIEM, Incident Response, Basic understanding of security technologies-User behavior/Malware Analysis, Knowledge on Securonix, Defender, CrowdStrike, FortiSOAR and Splunk Admin Additional Information:- The candidate should have a minimum of 5 years of experience in Infrastructure Security Vulnerability Management Operations.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

Pune

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : ServiceNow Governance, Risk, and Compliance (GRC) Good to have skills : Security Architecture DesignMinimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:- Expected to perform independently and become an SME.- Required active participation/contribution in team discussions.- Contribute in providing solutions to work related problems.- Develop and implement security architecture solutions.- Conduct risk assessments and provide recommendations for security enhancements.- Collaborate with cross-functional teams to ensure security best practices are implemented.- Stay updated on the latest security trends and technologies.- Provide guidance and mentorship to junior security professionals. Professional & Technical Skills: - Must To Have Skills: Proficiency in ServiceNow Governance, Risk, and Compliance (GRC).- Strong understanding of cloud security principles.- Experience in implementing security controls in cloud environments.- Knowledge of industry standards and regulations related to cloud security.- Hands-on experience with security tools and technologies. Additional Information:- The candidate should have a minimum of 7 years of experience in ServiceNow Governance, Risk, and Compliance (GRC).- This position is based at our Pune office.- A BTECH degree is required. Qualification 15 years full time education

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies